Aeroplane

Cybersecurity for researchers, academics and their research data

Research data is our most valuable, as well as our most vulnerable digital asset, and this is true for individual researchers as well as the university as a whole. Knowing how to properly store, secure and share your data can make all the difference to your research career.

We know that, as researchers, you need a certain level of openness and flexibility in your infrastructures to undertake your work, but this must be balanced by making the appropriate choices when it comes to cyber threats.

We're all in this together video series

As open as possible

We know that, as researchers, you need a certain level of openness and flexibility in your infrastructures to undertake your work, but this must be balanced by making the appropriate choices when it comes to cyber threats.

Cybersecurity for researchers, academics and their research

As open as possible

Cybersecurity for researchers, academics and their research data

We know that, as researchers, you need a certain level of openness and flexibility in your infrastructures to undertake your work, but this must be balanced by making the appropriate choices when it comes to cyber threats.

Cybersecurity for professional services staff

As closed as necessary

Cybersecurity for professional services staff

Professional services staff at Imperial are entrusted with some of the university’s most sensitive data, from HR records to payroll and student information. Access to this data must be carefully managed. 

Cybersecurity for everyone at Imperial

We're all in this together

Cybersecurity for everyone at Imperial

To keep Imperial secure we need all members of our community - staff and students - to take their safety and security online seriously.

These videos have been created in collaboration with Research England and our academic community using Enhancing Research Culture funding.

What can I do?

The university offers a wealth of guidance and support to help you stay safe from cyber threats. Here’s a distillation of some of that key guidance. And remember, if in doubt, contact ICT.

What can I do?

A Computer with padlock on the screen

Data Management is Cybersecurity (Storing Research Data)

Where you store research data matters, and depends on the type of data you’re handling.

 

Diamond in a safe

Data Management is Cybersecurity (Sharing Research Data)

Collaboration is essential in research, and it’s important to make sure that your data is stored and shared as securely as it needs to be with your collaborators 

 

Computer with a catle gate on the screen

Imperial-friendly apps

Free platforms and unvetted AI services may trade on you and your data. Check whether the university provides a secure alternative first.

Road sweeper

Managing your own devices

If you’re managing your own devices, be sure to keep them updated and secure, especially when taking them offsite or travelling.

Mainframe servers

Managing Research Infrastructure

Managing Research Infrastructure

Aeroplane

Working overseas

Though not all risks come from the outside, it’s important to be mindful of potential threats that can arise from collaborating or working overseas, and from nation-state attacks.

 

A ninja with sword and ICT on his balaclava

Report an incident

Cyber attacks now evolve within hours rather than days. Report suspected or real incidents as soon as possible.